Executive Summary
Informations | |||
---|---|---|---|
Name | CVE-2024-28755 | First vendor Publication | 2024-04-03 |
Vendor | Cve | Last vendor Modification | 2024-09-06 |
Security-Database Scoring CVSS v3
Cvss vector : N/A | |||
---|---|---|---|
Overall CVSS Score | NA | ||
Base Score | NA | Environmental Score | NA |
impact SubScore | NA | Temporal Score | NA |
Exploitabality Sub Score | NA | ||
Calculate full CVSS 3.0 Vectors scores |
Security-Database Scoring CVSS v2
Cvss vector : | |||
---|---|---|---|
Cvss Base Score | N/A | Attack Range | N/A |
Cvss Impact Score | N/A | Attack Complexity | N/A |
Cvss Expoit Score | N/A | Authentication | N/A |
Calculate full CVSS 2.0 Vectors scores |
Detail
An issue was discovered in Mbed TLS 3.5.x before 3.6.0. When an SSL context was reset with the mbedtls_ssl_session_reset() API, the maximum TLS version to be negotiated was not restored to the configured one. An attacker was able to prevent an Mbed TLS server from establishing any TLS 1.3 connection, potentially resulting in a Denial of Service or forced version downgrade from TLS 1.3 to TLS 1.2. |
Original Source
Url : http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-28755 |
Sources (Detail)
Source | Url |
---|
Alert History
Date | Informations |
---|---|
2024-09-07 00:27:41 |
|
2024-04-04 02:42:34 |
|
2024-04-04 02:42:33 |
|
2024-04-03 17:27:23 |
|
2024-04-03 09:27:23 |
|